Tag: Social Media

Bitcoin and the ZeroAccess Botnet

Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin.

Security 101: Two-Factor Authentication

Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password – one that doesn’t contain words from the dictionary, and consists of upper case letters, lower case letters, numbers, and special symbols like exclamation points, ampersands or other non-alphanumeric characters – is often no longer strong enough to prevent a breach. You could have an incredibly strong passwo…

Sandboxing Technologies, Techniques Get Another Look

Neil MacDonald, a vice president at Gartner, wrote in a blog last week the idea of sandboxing potentially malicious content and applications isn’t new, but interest in this type of approach – particularly on Windows desktops – is on the rise. A growing number of virtualization and abstraction techniques available on Windows, he wrote, create isolation to provide security separation. FortiGuard Labs describes sandboxing as a practice employed by security technology to separate running progra…

One Brand of Firewall is a Best Practice

In case you haven’t seen it, there’s an interesting research note authored by Greg Young of Gartner that posits “one brand of firewall is a best practice for most enterprises.”  And, in particular we have to agree.  Why? Let’s go back to 1999 and see. Taking a quote from Bruce Schneier’s, A Plea for Simplicity, “the worst enemy of security is complexity.” Thirteen years later, Gartner also seems to agree; saying basically that having different firewall platforms increases configuration and m…

Fortinet’s FortiGuard Labs Discovers Critical Vulnerabilities in Adobe Shockwave Player

Affected Software Could Allow an Attacker, Who Successfully Exploits These Vulnerabilities, to Run Malicious Code on the Affected System SUNNYVALE, Calif., February 20, 2013 ― Fortinet® (NASDAQ: FTNT) − a world leader in high-performance network security – today announced the company’s FortiGuard Labs has identified critical zero-day vulnerabilities in Adobe Shockwave Player. Fortinet’s FortiGuard Labs consist of over 175 researchers and analysts world-wide, working to discover, monito…

Effectively Creating Filters and Monitoring Events with SolarWinds Log & Event Manager

In this short video hosted by SolarWinds Education and Certification Specialist Skeeter Pond, you will learn about using Log & Event Manager for real-time monitoring, including the when and how of building filters. For more short videos about Log & Event Manager’s features, visit: www.solarwinds.com